Skip to main content

Shmoocon 2010

ShmooCon is an American hacker convention organized by The Shmoo Group. There are typically 40 different talks and presentations on a variety of subjects related to computer security and cyberculture. Multiple events are held at the convention related to cryptography and computer security such as Shmooganography, Hack Fortress, a locksport village hosted by TOOOL DC, and Ghost in the Shellcode.



rss RSS

SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
Shmoocon 2010
movies
eye 149
favorite 0
comment 0
Bluetooth Keystrokes
Shmoocon 2010
movies
eye 80
favorite 0
comment 0
DiY Hard Drive Diagnostics
Shmoocon 2010
movies
eye 79
favorite 0
comment 0
Ring 1 Vs Ring 2
Shmoocon 2010
movies
eye 67
favorite 0
comment 0
Build Your Own Predator
Shmoocon 2010
by Tom Eston, Kevin Johnson, Robin Wood
movies
eye 59
favorite 0
comment 0
In Social Zombies II: Your Friends Need More Brains, Tom Eston, Kevin Johnson and Robin Wood continue the Zombie invasion from "Social Zombies: Your Friends want to eat Your Brains" presented at DEFCON 17. This presentation will further examine the risks of social networks and then present new techniques and tools that can be used to exploit these issues. This presentation begins by discussing new twists on existing privacy concerns that are caused by the trust mass that is social...
Shmoocon 2010
movies
eye 54
favorite 0
comment 0
Back To The Glass House
Shmoocon 2010
by Kingtuna and TheX1le
movies
eye 49
favorite 0
comment 0
Wireless de-authentication and disassociation are nothing new. The problem with it stems from the fact that tools are either too limited in scope IE... aireplay-ng or way to broad and no discriminating IE.... Mdk3. Enter Airdrop-ng. Taking the best from each and built around a solid rule parser you can preform both a very targeted attack or unleash the packets from hell and rain down packets of death on the wireless networks of the world. Airdrop-ng is more then just a deauth tool its a client...
Shmoocon 2010
movies
eye 46
favorite 0
comment 0
GPU Vs CPU Supercomputing Shootout
Shmoocon 2010
movies
eye 44
favorite 0
comment 0
Guest Stealing The Vmware Way
Shmoocon 2010
movies
eye 39
favorite 0
comment 0
Pulling The Plug
Shmoocon 2010
movies
eye 39
favorite 0
comment 0
De Gustibus
Shmoocon 2010
by Navas, K - Cadet, US Military Academy, Brasefield, D - Cadet, US Military Academy, Grunzweig, N - Cadet, US Military Academy, OConnor, T - Faculty Advisor, US Military Academy
movies
eye 36
favorite 0
comment 0
This talk will discuss an implementation of a honeyclient framework for mobile devices. In wireless environments, honeypots typically mimic access points or a single protocol of a device. The authors implemented a framework that can simultaneously imitate the WiFi, Bluetooth, and GPS behavior of multiple instances of different devices. This talk focuses on the challenges associated with accurately pretending to be somebody you are not and how honeyclients can contribute to the future of mobile...
Shmoocon 2010
movies
eye 34
favorite 0
comment 0
The Current State Of Computer Security
Shmoocon 2010
movies
eye 34
favorite 0
comment 0
Cyborg Information Security
Shmoocon 2010
movies
eye 33
favorite 0
comment 0
Cracking The Foundation
Shmoocon 2010
movies
eye 30
favorite 0
comment 0
Keynote
Shmoocon 2010
movies
eye 28
favorite 0
comment 0
The Friendly Traitor
Shmoocon 2010
movies
eye 27
favorite 0
comment 0
Flying Instruments Only
Shmoocon 2010
movies
eye 27
favorite 0
comment 0
Tales From The Crypto
Shmoocon 2010
movies
eye 26
favorite 0
comment 0
GSM Srsly
Shmoocon 2010
movies
eye 25
favorite 0
comment 0
Info Disclosure Via P2P
Shmoocon 2010
movies
eye 25
favorite 0
comment 0
JSunPack Network
Shmoocon 2010
movies
eye 24
favorite 0
comment 0
Learning By Breaking
Shmoocon 2010
movies
eye 24
favorite 0
comment 0
The New World Of Smartphone Security
Shmoocon 2010
movies
eye 23
favorite 0
comment 0
How To Be An RSol
Shmoocon 2010
movies
eye 22
favorite 0
comment 0
Detecting Rogue APs Using Clock Skews
Shmoocon 2010
movies
eye 22
favorite 0
comment 0
Blackberry Mobile Spyware
Shmoocon 2010
movies
eye 20
favorite 0
comment 0
WLCCP Analysis Of Potentially Flawed Protocol
Shmoocon 2010
movies
eye 17
favorite 0
comment 0
Infrastructual Weaknesses In Distrib Wireless Comms
Shmoocon 2010
movies
eye 16
favorite 0
comment 0
Windows File Pseudonyms
Shmoocon 2010
movies
eye 16
favorite 0
comment 0
Better Approaches To Physical Tamper Detection
Shmoocon 2010
movies
eye 16
favorite 0
comment 0
Splendiferous Story
Shmoocon 2010
movies
eye 16
favorite 0
comment 0
BaSO4
Shmoocon 2010
movies
eye 15
favorite 0
comment 0
0wn The Con
Shmoocon 2010
movies
eye 15
favorite 0
comment 0
Recoving Info From VMs & Hyperr Environments
Shmoocon 2010
movies
eye 12
favorite 0
comment 0
Closing